


default search action
Informatica (Lithuanian Academy of Sciences), Volume 14
Volume 14, Number 1, 2003
- Robertas Damasevicius, Vytautas Stuikys:

Wrapping of Soft IPs for Interface-based Design Using Heterogeneous Metaprogramming. 3-18 - Eyas El-Qawasmeh:

Scene Change Detection Schemes for Video Indexing in Uncompressed Domain. 19-36 - Renata Mansini, Wlodzimierz Ogryczak, Maria Grazia Speranza:

On LP Solvable Models for Portfolio Selection. 37-62 - Henrikas Pranevicius, Germanas Budnikas:

Creation of ESTELLE/Ag Specifications Using Knowledge Bases. 63-74 - Gailius Raskinis, Danute Raskiniene:

Building Medium-Vocabulary Isolated-Word Lithuanian HMM Speech Recognition System. 75-84 - Hung-Min Sun, Her-Tyan Yeh, Tzonelih Hwang:

On the Linkability of Some Group Signature Schemes. 85-94 - Ji-Zong Wang, Xi-Juan Wang, Hong-Guang Ni:

An Algorithm of Neural Network and Application to Data Processing in Concrete Engineering. 95-110 - Chou Chen Yang, Ting Yi Chang, Jian Wei Li, Min-Shiang Hwang:

Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem. 111-120 - Antanas Zilinskas, Aurelija Podlipskyte:

On Multimodality of the SSTRESS Criterion for Metric Multidimensional Scaling. 121-130
Volume 14, Number 2, 2003
- Eduardas Bareisa, Kestutis Motiejunas, Rimantas Seinauskas:

Identifying Legal and Illegal States in Synchronous Sequential Circuits Using Test Generation. 135-154 - Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:

Partially Blind Threshold Signature Based on RSA. 155-166 - Raimondas Ciegis, Vadimas Starikovicius:

Realistic Performance Prediction Tool for the Parallel Block LU Factorization Algorithm. 167-180 - Algis Garliauskas:

Artificial Neural Networks Models with Fuzziness and Chaos Phenomena. 181-194 - Bin-Tsan Hsieh, Hung-Min Sun, Tzonelih Hwang:

On the Security of Some Password Authentication Protocols. 195-204 - Shin-Jia Hwang, Chiu-Chin Chen:

Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers. 205-212 - Kazys Kazlauskas:

Optimal Estimation of the Parameters of Linear Periodically Time-varying Systems. 213-222 - Arthur Pchelkin:

Efficient Exploration in Reinforcement Learning Based on Utile Suffix Memory. 237-250 - Ravinder Krishna Raina, Indu Bala Bapna:

Certain Integral Means Inequalities Involving Fractional Calculus Operators of Analytic Functions. 251-258 - Edmundas Kazimieras Zavadskas, Leonas Ustinovichius, Friedel Peldschus:

Development of Software for Multiple Criteria Evaluation. 259-272
Volume 14, Number 3, 2003
- Bostjan Brumen, Izidor Golob, Tatjana Welzer, Ivan Rozman, Marjan Druzovec, Hannu Jaakkola:

An Algorithm for Protecting Knowledge Discovery Data. 277-288 - Chin-Chen Chang, Kuo-Feng Hwang:

Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards. 289-294 - Nikolas Dyomin, Irina Dyomin, Irina Safronova, Svetlana Rozhkova:

Information Amount Determination for Joint Problem of Filtering and Generalized Extrapolation of Stochastic Processes with Respect to the Set of Continuous and Discrete Memory Observations. 295-322 - Raimundas Liutkevicius:

Coupled Adaptive Fuzzy Control of Nonlinear, Time-Varying Plant. 323-336 - Algirdas Mykolas Montvilas:

Features of Sequential Nonlinear Mapping. 337-348 - Sarunas Paulikas, Dalius Navakauskas:

New Implementation Scheme for the Restoration of Voiced Speech Signals. 349-356 - Manuel de la Sen:

Absolute Stability of Single-Input Single-Output Systems with Constant Internal Point Time Delays. 357-374 - Athanasios D. Styliadis, Petros G. Patias, Nikos C. Zestas:

3-D Computer Modeling with Intra-Component, Geometric, Quality and Topological Constraints. 375-392 - Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang:

Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. 393-402 - Julius Zilinskas, Ian David Lockhart Bogle:

Evaluation Ranges of Functions using Balanced Random Interval Arithmetic. 403-416
Volume 14, Number 4, 2003
- George E. Antoniou:

A DFT-Based Algorithm for n-Order Singular State Space Systems. 421-430 - Chin-Chen Chang, Chi-Shiang Chan:

A Watermarking Scheme Based on Principal Component Analysis Technique. 431-444 - Hung-Yu Chien:

Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function. 445-454 - Albertas Caplinskas, Audrone Lupeikiene, Olegas Vasilecas:

The Role of Ontologies in Reusing Domain and Enterprise Engineering Assets. 455-470 - Dale Dzemydiene, Vitalija Rudzkiene:

Data Analysis Strategy for Revealing Multivariate Structures in Social-Economic Data Warehouses. 471-486 - Antanas Lipeika, Joana Lipeikiene:

Word Endpoint Detection Using Dynamic Programming. 487-496 - Alfonsas Misevicius:

A Modified Simulated Annealing Algorithm for the Quadratic Assignment Problem. 497-514 - Branka Nikolic, Petar Hotomski:

Comparison of H-Logical Norm with some t-Norms. 515-528 - Alvydas Paunksnis, Skaidra Kurapkiene, Audris Maciulis, Marija-Liucija Paunksniene:

Evaluation of Ultrasound Attenuation Characteristics of Human Cataract. 529-540 - Leonardas Vilkauskas, Abdonas Tamosiunas, Regina Reklaitiene, Algirdas Juozulynas:

Application of Survival Models for the Population Studies. 541-550 - Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang:

Security of Improvement on Methods for Protecting Password Transmission. 551-558

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














